H3c-technologies H3C WA2600 Series WLAN Access Points Manual de usuario Pagina 6

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 84
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 5
i
Table of Contents
1 Applicable Models and Software Versions.............................................................................................1-1
2 Feature Matrix............................................................................................................................................2-1
3 Command/Parameter Matrix.....................................................................................................................3-1
4 WLAN Interface Configuration.................................................................................................................4-1
Overview.................................................................................................................................................4-1
WLAN-Radio Interface............................................................................................................................4-1
Introduction......................................................................................................................................4-1
Configuring a WLAN-Radio Interface..............................................................................................4-1
WLAN-BSS Interface ..............................................................................................................................4-2
Introduction......................................................................................................................................4-2
Configuring a WLAN-BSS Interface................................................................................................4-2
WLAN Mesh Interface.............................................................................................................................4-3
Introduction......................................................................................................................................4-3
Entering WLAN Mesh Interface View..............................................................................................4-3
Configuring a WLAN Mesh Interface...............................................................................................4-3
WLAN Mesh Link Interface.....................................................................................................................4-3
Displaying and Maintaining a WLAN Interface .......................................................................................4-3
5 WLAN Security Configuration..................................................................................................................5-1
WLAN Security Configuration.................................................................................................................5-1
Overview..........................................................................................................................................5-1
Authentication Modes......................................................................................................................5-1
WLAN Data Security........................................................................................................................5-2
Client Access Authentication...........................................................................................................5-3
Protocols and Standards.................................................................................................................5-4
Configuring WLAN Security ....................................................................................................................5-4
Enabling an Authentication Method.................................................................................................5-4
Configuring the PTK Lifetime ..........................................................................................................5-5
Configuring the GTK Rekey Method ...............................................................................................5-5
Configuring Security IE....................................................................................................................5-6
Configuring Cipher Suit ...................................................................................................................5-7
Configuring Port Security ................................................................................................................5-9
Displaying and Maintaining WLAN Security..................................................................................5-11
WLAN Security Configuration Examples ..............................................................................................5-12
PSK Authentication Configuration Example..................................................................................5-12
MAC-and-PSK Authentication Configuration Example .................................................................5-13
802.1X Authentication Configuration Example..............................................................................5-16
Dynamic WEP Encryption-802.1X Authentication Configuration Example...................................5-23
Supported Combinations for Ciphers....................................................................................................5-25
Vista de pagina 5
1 2 3 4 5 6 7 8 9 10 11 ... 83 84

Comentarios a estos manuales

Sin comentarios